Skip to content

Driver Objects

Evidence: Driver Objects
Description: Collect Driver Objects Information
Category: System
Platform: windows
Short Name: drvobjinf
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

Kernel driver objects contain detailed information about loaded drivers including their dispatch tables, which specify how the driver handles various I/O operations. Analyzing driver object details can reveal rootkit behavior, driver hooking, and malicious driver functionality.

The driver object includes function pointers for DriverInit, DriverStart, DriverUnload, major functions (IRP handlers), and Fast I/O routines. Anomalies in these function pointers can indicate driver compromise.

This collector gathers structured data about driver objects.

FieldDescriptionExample
ObjectAddressDriver object address0xFFFF8A8012345678
DriverSizeSize of driver in memory524288
ServiceKeyNameService registry key name\Registry\Machine\System\CurrentControlSet\Services\MyDriver
DriverInitDriverEntry address0xFFFFF80012340000
DriverStartDriver start routine address0xFFFFF80012341000
DriverUnloadDriver unload routine address0xFFFFF80012342000
DriverStartIoStartIo routine address0xFFFFF80012343000
AddDeviceAddDevice routine address0xFFFFF80012344000

This collector:

  • Creates a snapshot of the \Driver object directory
  • For each driver object, uses IOCTL to retrieve detailed information
  • Extracts driver object structure details
  • Records all function pointers from dispatch tables
  • Creates columns for all 28 Fast I/O functions
  • Creates columns for all 28 Major functions

Driver object analysis enables advanced rootkit detection and driver security analysis. Investigators use this data to detect hooked driver dispatch tables, identify rootkit driver modifications, analyze driver functionality, detect inline hooking of drivers, verify driver integrity, identify suspicious function pointers, and perform advanced malware analysis.